Elliptic Curve Cryptosystems-Based Date-Constrained Hierarchical Key Management Scheme in Internet of Things

Total Page:16

File Type:pdf, Size:1020Kb

Elliptic Curve Cryptosystems-Based Date-Constrained Hierarchical Key Management Scheme in Internet of Things Sensors and Materials, Vol. 31, No. 2 (2019) 355–364 355 MYU Tokyo S & M 1776 Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things Tsung-Chih Hsiao,1 Tzer-Long Chen,2 Tzer-Shyong Chen,3* and Yu-Fang Chung4 1School of Arts, Southeast University, Nanjing 211189, China 2Department of Information Technology, Ling Tung University, Taichung 40852, Taiwan 3Department of Information Management, Tunghai University, Taichung 40704, Taiwan 4Department of Electrical Engineering, Tunghai University, Taichung 40704, Taiwan (Received May 23, 2018; accepted October 18, 2018) Keywords: mobile agent, mobile security, Internet of Things, key management, date-constrained In this paper, we propose a new mechanism to improve the disadvantage of the security mechanism proposed by a scholar and then fulfill the demands of Internet of Things (IoT) to go through the decentralized environment access control functions. We also propose the date-constrained hierarchical key management scheme for mobile agents. With elliptic curve cryptosystems (ECCs) and discrete logarithms, the proposed scheme is flexible. Moreover, the duration of access for each security class is restricted with a certain authorized discrete time period. We demonstrate the mathematical derivation and arguments for our scheme and further conduct a numerical trial. The constructed scheme could meet security needs and be more space-efficient. 1. Introduction Owing to the advantages of elliptic curve cryptosystems (ECCs), the scheme can recognize an access control object faster with a small key storage space. In this study, the scheme was constructed to reduce the work of key management, minimize key storage, enhance the computation time of construction and derivation phrases, and provide high flexibility and security. An ECC was proposed by Koblitz(1) and Miller(2) in 1985. To improve the existing cryptosystems,(3) the proposed ECC was used to reduce system parameters, public key certificates, bandwidth usage, power consumption, and hardware processor requirement, and for rapid implementation. Thus, the ECC with its advantages is useful for building a cryptosystem with high security and efficiency.(4) The mathematical illustration is described below.(4,5) Elliptic curves are categorized into two families: prime and binary curves. Prime curves (Zp) are suitable for use in software applications since they do not need to be extended for bit- fiddling operations. On the other hand, binary curves [GF(2n)] are for hardware applications since they need a small number of logic gates to build a cryptosystem. With the property of elliptic curves, the efficiency of ECC computing operation increases. *Corresponding author: e-mail: [email protected] https://doi.org/10.18494/SAM.2019.2085 ISSN 0914-4935 © MYU K.K. https://myukk.org/ 356 Sensors and Materials, Vol. 31, No. 2 (2019) 2. Previous Work In 1998, Volker and Mehrdad(5) designed a tree-structure-based security scheme of securing a safer place for mobile agents. The functions of this mechanism are distinguished into three categories: mobile agent authorization, key management, and access control. Thus far, Jeng and Wang,(6) Chung et al.,(7) Nikooghadam et al.,(8) and Lin and Hsu(9) have contributed to the incipience of a reliable and effective scheme for mobile agents. In 2006, Jeng and Wang(6) applied an ECC as a key management scheme to efficiently solve hierarchical access control problems. In the key derivation phase, a predecessor accesses the authorized files to derive encryption/decryption keys. We can use not only a secret key that is private to itself, but also the successor-related public information. Nevertheless, the scheme proposed by Jeng and Wang(6) had a loophole in security, which makes it possible for any outsider to derive an unauthorized encryption key. The relationship between any security classes was updated. The scheme proposed by Lin and Hsu(9) indicated such a flaw in the Jen (6) and Wang scheme by suggesting that an adversary could further derive the encryption key kj,2 of the security class kj,2 = fj(vl,j) without knowing any secret information. In 2008, another key management scheme was introduced by Chung et al.(7) This key management scheme was a novel and efficient solution to the dynamic access control problems in a user hierarchy by means of ECCs and one-way hash functions. The scheme introduced by Chung et al.(7) was different from that of Jen et al. in the application of polynomials. In Jen et al.’s scheme, each security class selected its own secret key and then sent the secret key to the Certificate Authority (CA) via a secure way, whereas in Chung et al.’s scheme, the same public polynomials were used in key generation and derivation phases. The CA was responsible for selecting all the secret parameters and sending them to the corresponding security classes via a secure way. On the other hand, constructing the interpolating polynomials requires both tremendous storage accommodation and a colossal amount of computational overhead. According to Knuth,(10) the cost of constructing an interpolating polynomial of degree m is derived by m additions, 2m2 + 2 subtractions, 2m2 + m − 1 multiplications, and m + 1 divisions. With respect to expenditure, Chung et al.’s scheme requires large computational expenditures and this suggests the considerable consumption of system resources to access confidential files. Hence, Nikooghadam et al.(8) introduced an ECC-based improved method for access control and key management. In 2009 and 2011, an improved version was raised by Jeng et al.’s scheme. They replaced (Ã(njPi)),Ki), which was proposed in Jeng et al.’s scheme with (h(r || Ã(njPi)),Ki) using a random number, r, and the one-way hash function h(·). This equation implies that Ã(njPi) is not a solution of fxii()−= fx () 0 anymore. The preference for this method over Jen et al.’s scheme is due to the fact that it can effectively eliminate the security flaw mentioned above. The elliptic curve discrete logarithm problem (ECDLP) is significantly more difficult and has a larger computational complexity than the integer factorization or discrete logarithm problem.(11) To satisfy security requirements, the ECC needs a comparatively smaller key size than the other cryptosystems. ECC-based access control schemes enjoy high security performance at the expense of bulky mobile agent codes and excessive calculations for encryption/decryption keys. Sensors and Materials, Vol. 31, No. 2 (2019) 357 This mechanism based on the ECC theory, therefore, is more efficient and less computationally complex with respect to key generation and derivation. Compared with the other published schemes, in addition to using elliptic curve cryptography, our scheme also incorporates the concepts of elliptic curve digital signature and data constraint. The purpose of using the concept of elliptic curve digital signature is to ensure that a private key is generated for a user only at a legal time granule as a data-bound warrant. The purpose of using the Internet of Things (IoT) is to be able to share resources and information. IoT, itself, provides an open and public manipulation environment. The heterogeneity of data enables the management and sharing of resources and information. However, ensuring the confidentiality, correctness, and availability of the legally stored information definitely becomes a challenge for sharing information from the past to the present. Since the environment of the internet is unpredictable, this often leads to security problems, such as unauthorized access requirements, data being compromised or unauthorized access, and privacy disclosure; these issues can reveal the necessity and importance of the access control mechanism. Simultaneously, based on some scholars, Volker and Mehrdad(5) suggested some methods of access control to the acting agent and key management mechanism. These will consume the agent’s time and cause security problems. When the application of mobile agents roams the internet, it may be attacked by unfriendly agents or the host or the agents will arrive at an unfamiliar or unknown host. This situation will lead to tampering or inaccurate execution of delivered tasks, resulting in private information being peeped or stolen. In this paper, therefore, an access control mechanism is proposed. The application of a mobile agent who is in a hierarchical relationship structure can adequately use the one-way hash function, the concept of time series, and ECC to ensure the security of the key; simultaneously, it can give the permission classification in order to achieve security. 3. Proposed Scheme Akl and Taylor’s proposed access control scheme(12) was based on a hierarchical structure model, which was obtained by assigning each user to a security class, which can be represented as SC = {SC1, SC2, SC3, …, SCk}. On the basis of the hierarchical structure, the access relationship between one security class and another can be denoted by SCi ≥ SCj. For instance, the class of SCi is at a higher hierarchy than SCj and their relational representation is SCi ≥ SCj. The higher the hierarchy, the more authority to access the information. This means that the user SCi has the authority to access the information available to SCj. As the hierarchy network grows, SCi would have to accommodate a growing number of private keys held by groups at a lower hierarchy. It is considered that a lower hierarchy would cause key management problems and security issues. Thus, Akl and Taylor raised the concept of superkey in place of key. In this manner, key management issues can be resolved. On the basis of the determined hierarchical structure of SCi ≥ SCj, the user SCi uses mathematical operations to obtain the SCj’s superkey with his superkey. Figure 1 shows an illustration of an improved version of Akl and Taylor’s structure. Among the leaf nodes of a hierarchical structure, we shall offer an explanation regarding the access of 358 Sensors and Materials, Vol.
Recommended publications
  • Smart Home Power Management Based on Internet of Things and Smart Sensor Networks
    Sensors and Materials, Vol. 33, No. 5 (2021) 1687–1702 1687 MYU Tokyo S & M 2564 Smart Home Power Management Based on Internet of Things and Smart Sensor Networks Tzer-Long Chen,1 Tsan-Ching Kang,2 Chien-Yun Chang,3 Tsung-Chih Hsiao,4,5* and Chih-Cheng Chen,6,7** 1Department of Finance, Providence University, Taichung 43301, Taiwan 2College of Computing and Informatics, Providence University, Taichung 43301, Taiwan 3Department of Fashion Business and Merchandising, Ling Tung University, Taichung 40852, Taiwan 4College of Computer Science and Technology, Huaqiao University, Xiamen, Fujian 361021, China 5Xiamen Key Laboratory of Data Security and Blockchain Technology, Huaqiao University, Xiamen, Fujian 361021, China 6Department of Automatic Control Engineering, Feng Chia University, Taichung 40724, Taiwan 7Department of Aeronautical Engineering, Chaoyang University of Technology, Taichung 413310, Taiwan (Received October 21, 2020; accepted March 8, 2021) Keywords: smart home, Internet of Things, smartphone, app implementation, sensor networks We have developed a system that includes a newly designed smart socket for IoT sensors and a cloud platform for smart home power management. The system can initiate the platform service upon the user’s authentication and give suggestions based on the analysis of usage patterns. By sending data to the analysis system through the IoT, the system can recommend to the user the most suitable power management setting, calculate the power consumption requirement of the user, and determine whether it is within a reasonable range. The cloud platform employs a mobile device app, which adopts a graphical user interface. The app effectively provides users with information on their domestic power consumption.
    [Show full text]
  • Study in Taiwan - 7% Rich and Colorful Culture - 15% in Taiwan, Ancient Chinese Culture Is Uniquely Interwoven No.7 in the Fabric of Modern Society
    Le ar ni ng pl us a d v e n t u r e Study in Foundation for International Cooperation in Higher Education of Taiwan (FICHET) Address: Room 202, No.5, Lane 199, Kinghua Street, Taipei City, Taiwan 10650, R.O.C. Taiwan Website: www.fichet.org.tw Tel: +886-2-23222280 Fax: +886-2-23222528 Ministry of Education, R.O.C. Address: No.5, ZhongShan South Road, Taipei, Taiwan 10051, R.O.C. Website: www.edu.tw www.studyintaiwan.org S t u d y n i T a i w a n FICHET: Your all – inclusive information source for studying in Taiwan FICHET (The Foundation for International Cooperation in Higher Education of Taiwan) is a Non-Profit Organization founded in 2005. It currently has 114 member universities. Tel: +886-2-23222280 Fax: +886-2-23222528 E-mail: [email protected] www.fichet.org.tw 加工:封面全面上霧P 局部上亮光 Why Taiwan? International Students’ Perspectives / Reasons Why Taiwan?1 Why Taiwan? Taiwan has an outstanding higher education system that provides opportunities for international students to study a wide variety of subjects, ranging from Chinese language and history to tropical agriculture and forestry, genetic engineering, business, semi-conductors and more. Chinese culture holds education and scholarship in high regard, and nowhere is this truer than in Taiwan. In Taiwan you will experience a vibrant, modern society rooted in one of world’s most venerable cultures, and populated by some of the most friendly and hospitable people on the planet. A great education can lead to a great future. What are you waiting for? Come to Taiwan and fulfill your dreams.
    [Show full text]
  • International Journal of Distance Education Technologies
    International Journal of Distance Education Technologies April-June 2014, Vol. 12, No. 2 Table of Contents Research Articles 1 Social Networks Analysis and Participation in Learning Environments to Digital Inclusion Based on Large-Scale Distance Education Aleksandra do Socorro da Silva, Cyberspace Institute, Federal Rural University of Amazônia (ICIBE - UFRA), Belem, Brazil & Federal University of Pará (PPGEE-UFPA), Belem, Brazil Silvana Rossy de Brito, Cyberspace Institute – Federal Rural University of Amazônia (ICIBE - UFRA), Belem, Brazil & Federal University of Pará (PPGEE-UFPA), Belem, Brazil Dalton Lopes Martins, Technology Faculty of São Paulo, Sao Paoulo, Brazil Nandamudi Lankalapalli Vijaykumar, National Institute for Space Research (INPE), Belem, Brazil Cláudio Alex Jorge da Rocha, Federal University of Pará (PPGEE-UFPA), Belem, Brazil & Federal Institute of Pará (IFPA), Sao Paulo, Brazil João Crisóstomo Weyl Albuquerque Costa, Federal University of Pará (PPGEE-UFPA), Belem, Brazil Carlos Renato Lisboa Francês, Federal University of Pará (PPGEE-UFPA), Belem, Brazil 26 Detection of Misconceptions and Misleading Questions by Using Quantitative Diagnostic Assessment Martin M. Weng, Department of Computer Science and Information Engineering, Tamkang University, New Taipei City, Taiwan Wen-Chih Chang, Department of Information Management, Chung-Hua University, Hsinchu, Taiwan Neil Y. Yen, School of Computer Science and Engineering, University of Aizu, Fukushima, Japan Timothy K. Shih, Department of Computer Science and Information
    [Show full text]
  • The Competitiveness of Taiwan Higher Education
    The Competitiveness of Taiwan Higher Education Presented By Wan-Lee Cheng, Ph.D. Chair Professor Chung Yuan Christian University At The Executive Conference on International and Cross- strait Affairs, 2013 June 26, 2013 Presentation Outlines • Taiwan Students Study Abroad (60s, 70s and 80s) • Time for Taiwan Higher Education Institutions to Make Contributions • Quality Assurance of Taiwan Higher Education • Government Investments in Research and Teaching • Uniqueness and Worthiness of Studying in Taiwan • Internationalization of Campuses • Additional Values on University Campuses in Taiwan • Conclusion 2 • The number of study abroad over the years in the 60s 70s and 80s • Overseas scholars returning homeland TAIWAN STUDENTS STUDY ABROAD 3 Taiwan Students Study Abroad Number of people approved to study abroad (A) 215,830 64,216 31,365 21,248 4,515 1950-1959 1960-1969 1970-1979 1980-1989 1990-1998 4 Taiwan Students Study Abroad Number of people return to Taiwan (B) 37,883 14,880 5,166 400 1,172 1950-59 1960-69 1970-79 **1980-1989 **1990-1998 5 Taiwan Students Study Abroad Percentage of return to Taiwan (B) / (A) * 100 23.17 17.55 16.5 8.9 5.5 1950-59 1960-69 1970-79 **1980-1989 **1990-1998 6 Taiwan Students Study Abroad Data from MOE 7 Number of Returning Study Abroad Scholars Employed in Various Sectors 1971-1998 Year Total Employment Assisted by the Youth Commission Self Employed(%) Research University Government Public Private Organizations (%) Teaching (%) Units (%) Businesses (%) Businesses (%) 1971 291 6.5 52.2 10 10.7 5.5 15.1 1972
    [Show full text]
  • The Relationship Between Information Transparency and Firm Value: Evidence from Taiwan
    Int. J. Business Excellence, Vol. 3, No. 2, 2010 125 The relationship between information transparency and firm value: evidence from Taiwan Chin-Fang Chao Department of Finance, Ling Tung University, No. 1, Lingtung Road, Nantun District, Taichung City, 408, Taiwan, R.O.C. and Graduate Institute of Business, Feng Chia University, No. 100 Wenhwa Rd., Seatwen, Taichung City, 407, Taiwan, R.O.C. Fax: 886-426390859 E-mail: [email protected] Chung-Cheng Hsu* Department of Finance, Ling Tung University, No. 1, Lingtung Road, Nantun District, Taichung City, 408, Taiwan, R.O.C. Fax: 886-426390859 E-mail: [email protected] *Corresponding author Ho-Sheng Yeh Department of Management Information System, Yuh Chang Biotech Corporation, No. 126, Zili Rd., Wuqi Township, Taichung County, 435, Taiwan, R.O.C. Fax: 886-426390859 E-mail: [email protected] Abstract: This study uses the indicators released by the Taiwan Securities & Futures Institute to re-score by hand the 262 listed companies in Taiwan’s electronics industry as measurements of those companies’ information transparency. In addition, we adopt book value per share, modified Tobin’s Q, stock price and return on equity as measured variables of firm value to explore the influence of information transparency on firm value. Based on structural equation model (SEM) analysis and path analysis with observed variables (PA-OV), we find that information transparency is positively correlated with firm value, indicating that the more transparent a firm’s information, the higher the firm value. We also find that the timeliness of information disclosure is the most important factor in information transparency and that it has a positive relationship with both stock price and return on equity.
    [Show full text]
  • Student Version Academic and Internship Handbook For
    Academic and Internship Handbook for International and Overseas Chinese Students-Student Version 52 Preface Welcome to Taiwan, the Republic of China! Taiwan is blessed with beautiful scenery, a pleasant climate and earnest local people. Our campus has a lively atmosphere, with caring teachers and helpful students. Studying here, not only can you acquire knowledge Welcome to Taiwan ! and expertise in the classroom and participate in diverse extracurricular activities in school, you can also explore the country more thoroughly in your free time, learning Taiwanese culture, tasting local delicacies and visiting famous attractions. On your arrival, you will definitely be thrilled by what you see; the next few years of studying here will, I am sure, leave an unforgettable, beautiful memory in your life. However, local customs, laws and regulations in Taiwan are different from other During your study in Taiwan, in addition to scheduling classroom courses, your countries. To equip you with guidance on schooling and living so that you won’t be at a academic department may arrange internship programs according to relevant regulations, loss in times of trouble, this reference manual has been purposely put together to provide provided they are part of your study, so that you can learn the nature and requirements of information on the problems you may encounter in your studies, internship and daily life, the workplace in your field of study, as well as enabling mutual corroboration of theory as well as their solutions. The information in this manual is for reference only; for matters and practice. Please be aware that the regulations on internship and working part-time not mentioned herein, please consult the designated office in your school.
    [Show full text]
  • A Generalized DEMATEL Theory with a Shrinkage Coefficient for an Indirect Relation Matrix
    MATEC Web of Conferences 119, 01020 (2017) DOI: 10.1051/ matecconf/201711901020 IMETI 2016 A generalized DEMATEL theory with a shrinkage coefficient for an indirect relation matrix Hsiang-Chuan Liu1, Ben-Chang Shia2, Yih-Chang Ou3,a and Huan-Wen Su4 1Department of Biomedical Informatics, Asia University, Taichung 41354, Taiwan 2Big Data Research Center & School of Management School of Health Care Administration, Taipei Medical University, Taipei 11031, Taiwan 3Department of Finance, Ling Tung University, Taichung 40852, Taiwan 4 Graduate School of Business Administration, Fu Jen Catholic University, Xinzhuang Dist., New Taipei City 24205, Taiwan Abstract. In this paper, a novel decision-making trial and evaluation laboratory (DEMATEL) theory with a shrinkage coefficient of indirect relation matrix is proposed, and a useful validity index, called Liu’s validity index, is also proposed for evaluating the performance of any DEMATEL model. If the shrinkage coefficient of an indirect relation matrix is equal to 1, then this new theory is identical to the traditional theory; in other words, it is a generalization of the traditional theory. Furthermore, the indirect relation is always considerably greater than the direct one in traditional DEMATEL theory, which is unreasonable and unfair because it overemphasizes the influence of the indirect relation. We prove in this paper that if the shrinkage coefficient is equal to 0.5, then the indirect relation is less than its direct relation. Because the shrinkage coefficient belongs to [0.5, 1], according to Liu’s validity index, we can find a more appropriate shrinkage coefficient to obtain a more efficient DEMATEL method. Some crucial properties of this new theory are discussed, and a simple example is provided to illustrate the advantages of the proposed theory.
    [Show full text]
  • The Rankings of Research Funding Among Universities in Taiwan
    Mar. 2010, Volume 7, No.3 (Serial No.64) US-China Education Review, ISSN 1548-6613, USA The rankings of research funding among universities in Taiwan WANG Ru-Jer (Department of Education, Graduate Institute of Educational Policy and Administration, National Taiwan Normal University, Taipei 106, Taiwan) Abstract: With the current trend that universities around the world have gradually stepped into higher education systems of popularization, there has been more diversity in universities; hence it has become necessary to increase the transparency of university governance. Since that university classification or university ranking is a powerful mechanism to demonstrate the diversity of an institute, the rankings of research funding have become desirable and also of great value. The main purpose of this study is to analyze the rankings of research funding among universities in Taiwan, and make relevant suggestions based on the findings. A secondary data analysis was conducted on the data obtained from the database of National Science Council, in order to develop the rankings of research funding among 164 universities in Taiwan. Based on the results, the conclusions are as follows: (1) The top three universities which won the funding of the National Science Council Research Project with the best overall strength were National Taiwan University, National Cheng Gung University, and National Chiao Tung University; (2) The top three universities which won the funding of the National Science Council Research Project with the best average faculty strength were National Tsing Hua University, National Chiao Tung University, and National Taiwan University. It is suggested that, when rating the strength of a university to win the research funding, both overall strength and average faculty strength should be considered to avoid the unfairness towards universities of smaller scale.
    [Show full text]
  • Differences Between Public and Private Institutions of Taiwan's
    Jul. 2008, Volume 5, No.7 (Serial No.44) US-China Education Review, ISSN1548-6613, USA Differences between public and private institutions of Taiwan’s HTVE system in determinants of competitiveness HUANG Chien-ern1, YUAN Young2, HUANG Chien-fu3 (1. Department of Public Finance, Ling Tung University, Taichung 408, Taiwan; 2. Department of Accounting & Information Technology, Ling Tung University, Taichung 408, Taiwan; 3. Office of Research & Development, Ling Tung University, Taichung 408, Taiwan) Abstract: Technological and vocational education has played a very important role in the development of Taiwan’s economy. The purpose of this research is to examine the determinants of competitiveness with a focus on differences between public and private institutions in Taiwan’s HTVE system. Determinants of internal and external factors were identified, and a competitiveness index was established. Results found that faculty teaching performance and completeness of curriculum design were the major determinants of internal factor. Financial support from government was the most influential determinant of public institutions in external factor, yet private institutions considered population growth rate was the most important one. Despite of top 3 institutions of both types, private universities seem possess relatively more competitive advantages than their public counterparts, and public colleges seem possess relatively more competitive advantages than their private competitors. Key words: higher education; Taiwan; technological and vocational education; competitiveness; determinants of competitiveness 1. Introduction Taiwan’s Higher Technological and Vocational Education (HTVE) system has experienced tremendous expansion during the past two decades, the number of technological colleges/universities grow up nearly 20% in those years. In contrast to the sharp increase in the number of HTVE schools, the growth rate of population and government financial support on higher education was declining in resent years.
    [Show full text]
  • Is Per Capita Real GDP Stationary in African Countries? Evidence from Panel SURADF Test
    Applied Economics Letters, 2006, 13, 1003–1008 Is per capita real GDP stationary in African countries? Evidence from panel SURADF test Tsangyao Changa,*, Hsu-Ling Changb, Hsiao-Ping Chuc and Chi-Wei Sud aDepartment of Finance, Feng Chia University, Taichung, Taiwan bDepartment of Accounting and Information Technology, Ling Tung University, Taichung, Taiwan cDepartment of Business Administration, Ling Tung University, Taichung, Taiwan dDepartment of Finance, Providence University, Taichung, Taiwan This note uses the newly developed panel SURADF tests advanced by Breuer et al. (2001) to investigate the time-series properties of real GDP for 47 African countries for the period 1980 to 2004. While the other Panel-based unit root tests are joint tests of a unit root for all members of the panel and are incapable of determining the mix of I(0) and I(1) series in the panel setting, the Panel SURADF tests a separate unit-root null hypothesis for each individual panel member and, therefore identifies how many and which series in the panel are stationary processes. The empirical results from several panel-based unit root tests indicate that the per capita real GDP for all the countries studied are non-stationary, however, when Breuer et al.’s Panel SURADF tests are conducted, one finds unit root in per capita real GDP only exist in two-third of countries studied. These results have important policy implications for African countries. I. Introduction making, modelling, testing and forecasting. Studies on this issue are of concern not only to empirical Ever since Nelson and Plosser (1982) published their researchers but also policymakers.
    [Show full text]
  • Table of Contents
    Table of Contents Preface ..............................................................................................................................................xviii Chapter 1 A Semantics-Based Information Distribution Framework for Large Web-Based Course Forum System ......................................................................................................... 1 Hung Chim, City University of Hong Kong, Hong Kong Xiaotie Deng, City University of Hong Kong, Hong Kong Chapter 2 Toward Development of Distance Learning Environment in the Grid ................................................. 20 Kuan-Ching Li, Providence University, Taiwan Yin-Te Tsai, Providence University, Taiwan Chuan-Ko Tsai, Providence University, Taiwan Chapter 3 Applying Semantic Agents to Message Communication in E-Learning Environment ........................ 32 Ying-Hong Wang, Tamkang University, Taiwan Chih-Hao Lin, Asia University, Taiwan Chapter 4 A Computer-Assisted Approach to Conducting Cooperative Learning Process................................... 50 Pei-Jin Tsai, National Chiao Tung University, Taiwan Gwo-Jen Hwang, National University of Tainan, Taiwan Judy C.R. Tseng, Chung-Hua University in Hsinchu, Taiwan Gwo-Haur Hwang, Ling Tung University, Taiwan Chapter 5 Collaborative E-Learning Using Semantic Course Blog ...................................................................... 67 Lai-Chen Lu, Tatung University, Taiwan Ching-Long Yeh, Tatung University, Taiwan Chapter 6 A Virtual Laboratory on Natural Computing: A Learning Experiment
    [Show full text]
  • The Effect of Tertiary Education Expansion on Fertility: a Note on Identification
    DISCUSSION PAPER SERIES IZA DP No. 14672 ‘Bachelors’ and Babies: The Effect of Tertiary Education Expansion on Fertility Tushar Bharati Simon Chang Qing Li AUGUST 2021 DISCUSSION PAPER SERIES IZA DP No. 14672 ‘Bachelors’ and Babies: The Effect of Tertiary Education Expansion on Fertility Tushar Bharati Qing Li University of Western Australia Business Shanghai University School Simon Chang University of Western Australia Business School and IZA AUGUST 2021 Any opinions expressed in this paper are those of the author(s) and not those of IZA. Research published in this series may include views on policy, but IZA takes no institutional policy positions. The IZA research network is committed to the IZA Guiding Principles of Research Integrity. The IZA Institute of Labor Economics is an independent economic research institute that conducts research in labor economics and offers evidence-based policy advice on labor market issues. Supported by the Deutsche Post Foundation, IZA runs the world’s largest network of economists, whose research aims to provide answers to the global labor market challenges of our time. Our key objective is to build bridges between academic research, policymakers and society. IZA Discussion Papers often represent preliminary work and are circulated to encourage discussion. Citation of such a paper should account for its provisional character. A revised version may be available directly from the author. ISSN: 2365-9793 IZA – Institute of Labor Economics Schaumburg-Lippe-Straße 5–9 Phone: +49-228-3894-0 53113 Bonn, Germany
    [Show full text]